Search

Your search keyword '"Keystream"' showing total 223 results

Search Constraints

Start Over You searched for: Descriptor "Keystream" Remove constraint Descriptor: "Keystream" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
223 results on '"Keystream"'

Search Results

1. Hardware-based efficient Mickey-128 stream cipher with unrolling factors for throughput enhancement.

2. Keystream

4. An efficient Grain-80 stream cipher with unrolling features to enhance the throughput on hardware platform.

6. Software Implementation of Plantlet Stream Cipher Using Verilog Hardware Description Language

7. State Transition Analysis of GSM Encryption Algorithm A5/1

9. State Transition Analysis of GSM Encryption Algorithm A5/1.

10. Performance and Statistical Analysis of Stream ciphers in GSM Communications

12. Implementation of super H-antimagic total graph on establishing stream cipher

13. Generalization of Roos bias in RC4 and some results on key-keystream relations

14. Image block generation from block-based SMRT in colour image encryption and its performance analysis

15. Performance and Statistical Analysis of Stream Ciphers in GSM Communications.

16. Design of a Novel Pseudo Random Generator based on Walsh Hadamard Transform and Bi S-Boxes.

17. On the Statistical Analysis of ZUC, Espresso and Grain v1

18. An efficient grayscale image encryption scheme based on variable length row-column swapping operations

19. Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion.

20. Deep Learning based Cryptanalysis of Stream Ciphers

21. Security analysis of Subterranean 2.0

22. Differential Fault Attack on the Stream Cipher LIZARD

23. An Observation of Non-randomness in NFSR-Based Stream Ciphers with Reduced Initialization Round

24. Image encryption algorithm with circle index table scrambling and partition diffusion

25. Melting SNOW-V: improved lightweight architectures

26. Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G

27. Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT

29. Image multi‐encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform

30. A novel batch image encryption algorithm using parallel computing

31. A differential fault attack on the WG family of stream ciphers

32. Performance and Statistical Analysis of Stream ciphers in GSM Communications

33. Breaking a novel image encryption scheme based on an improper fractional order chaotic system.

34. Breaking an image encryption algorithm based on the new substitution stage with chaotic functions.

35. A new security relation between information rate and state size of a keystream generator.

36. Cryptographic Capability Computing

37. Evolutionary approach to secure mobile telecommunication networks

38. Quantum security of Grain-128/Grain-128a stream cipher against HHL algorithm

39. Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion

40. A Fault Attack on the Family of Enocoro Stream Ciphers

41. New video encryption schemes based on chaotic maps

42. Efficient Image Encryption Scheme Using Henon Map, Dynamic S-Boxes and Elliptic Curve Cryptography

43. A Method of Evaluating the Security of Snow 2.0-Like Ciphers Against Correlation Attacks Over the Finite Extensions of Two Element Field

44. Masta: An HE-Friendly Cipher Using Modular Arithmetic

45. Secure and Efficient Compressed Sensing-Based Encryption With Sparse Matrices

46. Guess and determine cryptanalysis with variable sampling and its applications

47. An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase

48. Tabu Search in revealing the internal state of RC4+ cipher

49. 4G Network Security Algorithms: Overview

50. Keyed Polar Coding for Physical-Layer Security without Channel State Information

Catalog

Books, media, physical & digital resources